Computer Science ›› 2022, Vol. 49 ›› Issue (4): 362-368.doi: 10.11896/jsjkx.210300032
• Information Security • Previous Articles Next Articles
WANG Mei-shan, YAO Lan, GAO Fu-xiang, XU Jun-can
CLC Number:
[1] SWEENEY L.k-anonymity:A model for protecting privacy[J].International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems,2002,10(5):557-570. [2] SAMARATI P.Protecting respondents’ identities in microdata release[J].IEEE Transactions on Knowledge and Data Engineering,2001,13(6):1010-1027. [3] NARAYANAN A,SHMATIKOV V.Robust de-anonymization of large sparse datasrts[C]//Proceedings of the 2008 IEEE Symposium on Security and Privacy.Oakland,USA,2008:111-125. [4] XIONG P,ZHU T Q,WANG X F.A Survey on Differential Privacy and Applications[J].Chinese Journal of Computers,2014,37(1):101-122. [5] DWORK C.Differential privacy:A survey of results[C]//Proceedings of the 5th International Conference on Theory and Applications of Models of Computation.Xi’an,China,2008:1-19. [6] XIAO X,WANG G,GEHREKE J.Differential privacy viawavelet transforms[C]//Proceedings of the IEEE 26th International Conference on Data Engineering.Piscataway,NJ:IEEE,2010:225-236. [7] HAY M,LI C,MIKLAU G,et al.Accurate estimation of the degree distribution of private networks[C]//Proceedings of the 9th IEEE International Conference on Data Mining.Piscataway,NJ:IEEE,2009:169-178. [8] MCSHERRY F,MIRONOV I.Differentially private recom-mender systems;building privacy into the net[C]//Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.New York:ACM,2009:627-636. [9] CHEN R,MOHAMMED N,FUNG B C M,et al.Publishing set-valued data via differential privacy[J].Proceedings of the VLDB Endowment,2011,4(11):1087-1098. [10] DWORK C,MCSHERRY F,NISSIM K,et al.Calibrating noise to sensitivity in private data analysis[C]//Proceedings of the 3rd Conference on Theory of Cryptography.New York,USA,2006:265-284. [11] MCSHERRY F,TALWAR K.Mechanism design via differential privacy[C]//Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science.Providence,Rhode Island,USA,2007:94-103. [12] ABADI M,GOODFELLOW I.Deep learning with differentialprivacy[C]//ACM Sigsac Conference on Computer and Communications Security.ACM,2016:308-318. [13] CAI T T,WANG Y,ZHANG L.The cost of privacy:optimal rates of convergence for parameter estimation with differential privacy[J].arXiv:1902.04495,2019. [14] BEAULIEU-JONES B K,WU Z S,WILLIAMS C,et al.Privacy-preserving generative deep neural networks support clinical data sharing[J].BioRxiv,2017,159756. [15] BLUM A,DWORK C,MCSHERRY F,et al.Practical privacy:the SuLQ framework[C]//Proceedings of the 24th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems.2005:128-138. [16] DWORK C,NAOR M,PITASSI T,et al.Pan-private streaming algorithms[C]//Proceedings of the 1st Symposium on Innovations in Computer Science.2010. [17] LI Y,HAO Z F,WEN W,et al.Research on differential privacy preserving K-means clustering[J].Computer Science,2013,40(3):287-290. [18] SONG F G,MA T H,TIAN Y,et al.A new method of privacy protection:random k-anonymous[J].IEEE Access,2019,7:75434-75445. [19] SHI X J,HU Y L.Proprietary protection of dynamic set-valued data release based on classification tree[J].Computer Science,2017,44(5):120-124,165. [20] LI S Y,JI X S,YOU W,et al.A data query hierarchical control strategy based on differential privacy[J].Computer Science,2019,46(11):130-136. [21] DONG X M,WANG R,ZOU X K.Survey on Privacy Protection Solutions for Recommended Applications[J].Computer Science,2021,48(9):21-35. [22] CHEN H Y,WANG J H,HU Z P,et al.Dynamic update privacy protection algorithm for medical data publishing[J].Compu-ter Science,2019,46(1):206-211. [23] MCSHERRY F.Privacy integrated queries:An ex- tensible platform for privacy-preserving data analysis[J].Communications of the ACM,2010,53(9):89-97. |
[1] | LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients [J]. Computer Science, 2022, 49(9): 183-193. |
[2] | TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305. |
[3] | HUANG Jue, ZHOU Chun-lai. Frequency Feature Extraction Based on Localized Differential Privacy [J]. Computer Science, 2022, 49(7): 350-356. |
[4] | KONG Yu-ting, TAN Fu-xiang, ZHAO Xin, ZHANG Zheng-hang, BAI Lu, QIAN Yu-rong. Review of K-means Algorithm Optimization Based on Differential Privacy [J]. Computer Science, 2022, 49(2): 162-173. |
[5] | JIN Hua, ZHU Jing-yu, WANG Chang-da. Review on Video Privacy Protection [J]. Computer Science, 2022, 49(1): 306-313. |
[6] | LEI Yu-xiao , DUAN Yu-cong. AI Governance Oriented Legal to Technology Bridging Framework for Cross-modal Privacy Protection [J]. Computer Science, 2021, 48(9): 9-20. |
[7] | DONG Xiao-mei, WANG Rui, ZOU Xin-kai. Survey on Privacy Protection Solutions for Recommended Applications [J]. Computer Science, 2021, 48(9): 21-35. |
[8] | SUN Lin, PING Guo-lou, YE Xiao-jun. Correlation Analysis for Key-Value Data with Local Differential Privacy [J]. Computer Science, 2021, 48(8): 278-283. |
[9] | ZHANG Xue-jun, YANG Hao-ying, LI Zhen, HE Fu-cun, GAI Ji-yang, BAO Jun-da. Differentially Private Location Privacy-preserving Scheme withSemantic Location [J]. Computer Science, 2021, 48(8): 300-308. |
[10] | CHEN Tian-rong, LING Jie. Differential Privacy Protection Machine Learning Method Based on Features Mapping [J]. Computer Science, 2021, 48(7): 33-39. |
[11] | WANG Le-ye. Geographic Local Differential Privacy in Crowdsensing:Current States and Future Opportunities [J]. Computer Science, 2021, 48(6): 301-305. |
[12] | GUO Rui, LU Tian-liang, DU Yan-hui. Source-location Privacy Protection Scheme Based on Target Decision in WSN [J]. Computer Science, 2021, 48(5): 334-340. |
[13] | PENG Chun-chun, CHEN Yan-li, XUN Yan-mei. k-modes Clustering Guaranteeing Local Differential Privacy [J]. Computer Science, 2021, 48(2): 105-113. |
[14] | WANG Rui-jin, TANG Yu-cheng, PEI Xi-kai, GUO Shang-tong, ZHANG Feng-li. Block-chain Privacy Protection Scheme Based on Lightweight Homomorphic Encryption and Zero-knowledge Proof [J]. Computer Science, 2021, 48(11A): 547-551. |
[15] | LI Yu, DUAN Hong-yue, YIN Yu-yu, GAO Hong-hao. Survey of Crowdsourcing Applications in Blockchain Systems [J]. Computer Science, 2021, 48(11): 12-27. |
|